Addressing the critical challenges of poor structure, weak relevance, and limited reusability in aerospace model software development documents, we propose a knowledge-based retrieval method. This method constructs a ...
详细信息
The landscape of computing technologies is changing rapidly, straining existing softwareengineering practices and tools. The growing need to produce and maintain increasingly complex multi-architecture applications m...
详细信息
The proceedings contain 31 papers. The special focus in this conference is on softwareengineering and Formal Methods, Human-Oriented Formal Methods, Safety and Formal Methods, Foundations and Techniques for Open Sour...
ISBN:
(纸本)9783319152004
The proceedings contain 31 papers. The special focus in this conference is on softwareengineering and Formal Methods, Human-Oriented Formal Methods, Safety and Formal Methods, Foundations and Techniques for Open Source software Certification and Modeling and knowledge Management Applications. The topics include: A usability evaluation of interactive theorem provers using focus groups;an approach for creating domain specific visualisations of CSP models;on a process algebraic representation of sequence diagrams;modelling and verification of survivability requirements for critical systems;a testing-based approach to ensure the safety of shared resource concurrent systems;a contracts-based framework for systems modeling and embedded diagnostics;ontology for learning processes in FLOSS communities;a latent representation model for sentiment analysis in heterogeneous social networks;use of mobile phone data to estimate visitors mobility flows;a mathematical model for assessing KRAS mutation effect on monoclonal antibody treatment of colorectal cancer;retrieving points of interest from human systematic movements;path-sensitive race detection with partial order reduced symbolic execution and towards synthesis of attack trees for supporting computer-aided risk analysis.
Data Mining is a process of extracting valuable information and knowledge that people have not observed from a large number of complicated data. Massive data mining based on cloud computing can optimize the dynamic re...
详细信息
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-...
详细信息
Examination and evaluation are effective methods for assessing the effectiveness of teaching and the quality of talent cultivation, which are essential components of the teaching process. Traditional course assessment...
详细信息
The proceedings contain 79 papers. The topics discussed include: a grid scheduling algorithm for bag-of-tasks applications using multiple queues with duplication;model the MPI performance for non-contiguous data;optim...
详细信息
ISBN:
(纸本)0769526136
The proceedings contain 79 papers. The topics discussed include: a grid scheduling algorithm for bag-of-tasks applications using multiple queues with duplication;model the MPI performance for non-contiguous data;optimized algorithm for computing invariants of ordinary petri nets;radiative heat transfer simulation using programmable graphics hardware;decoupling metrics for services composition;an approach to analyzing the Windows and Linux security models;reducing the requirement in FEC codes via capillary routing;a distributed topic map architecture for enterprise knowledge management;mapping COSA software architecture concepts into UML2.0;analyzing security interoperability during component integration;fault tolerant non-trivial repeating pattern discovering for music data;hoarding and prefetching for mobile databases;on history-sensitive models of interactive queues;application services based on personal data ontology;and irregular patch for image synthesis.
The core of design lies in the acquisition and application of knowledge. knowledge push technology can effectively improve the utilization efficiency of knowledge by designers, thus enabling more efficient task comple...
详细信息
The software industry is characterized by an environment of uncertainty, high volatility, and constant change. This context has shaped the industry, its components, and actors, generating methodologies capable of meet...
详细信息
The proceedings contain 23 papers. The special focus in this conference is on Database and Expert Systems Applications. The topics include: Semantic Influence Score: Tracing Beautiful Minds Through knowledge Diffusion...
ISBN:
(纸本)9783030871000
The proceedings contain 23 papers. The special focus in this conference is on Database and Expert Systems Applications. The topics include: Semantic Influence Score: Tracing Beautiful Minds Through knowledge Diffusion and Derivative Works;robust and Efficient Bio-Inspired Data-Sampling Prototype for Time-Series Analysis;membership-Mappings for Data Representation Learning: Measure Theoretic Conceptualization;membership-Mappings for Data Representation Learning: A Bregman Divergence based Conditionally Deep Autoencoder;data Catalogs: A Systematic Literature Review and Guidelines to Implementation;task-Specific Automation in Deep Learning Processes;approximate Fault Tolerance for Edge Stream Processing;deep Learning Rule for Efficient Changepoint Detection in the Presence of Non-Linear Trends;time Series Pattern Discovery by Deep Learning and Graph Mining;a Conceptual Model for Mitigation of Root Causes of Uncertainty in Cyber-Physical Systems;integrating Gene Ontology based Grouping and Ranking into the Machine Learning Algorithm for Gene Expression Data Analysis;SVM-RCE-R-OPT: Optimization of Scoring Function for SVM-RCE-R;short-Term Renewable Energy Forecasting in Greece Using Prophet Decomposition and Tree-based Ensembles;a Comparative Study of Deep Learning Approaches for Day-Ahead Load Forecasting of an Electric Car Fleet;Security-based Safety Hazard Analysis Using FMEA: A DAM Case Study;Privacy Preserving Machine Learning for Malicious URL Detection;remote Attestation of Bare-Metal Microprocessor software: A Formally Verified Security Monitor;Provenance and Privacy in ProSA: A Guided Interview on Privacy-Aware Provenance;placeholder Constraint Evaluation in Simulation Graphs;Walk Extraction Strategies for Node Embeddings with RDF2Vec in knowledge Graphs;bridging Semantic Web and Machine Learning: First Results of a Systematic Mapping Study.
暂无评论